Safe Your Privacy Profile


There are many types of specialist communication channel to communicate and exchange information for people around the world to use it such as Facebook, Instagram, Twitter , Blog , Vlog and Podcast. From all this specialist communication i am gonna use Blog because people around the world can watch or read my blog for their knowledge and they can easy comment about it.

What Is Blog?


A blog is an online diary or journal located on a website. The content of a blog typically includes text, pictures, videos, animated GIFs and even scans from old physical offline diaries or journals and other hard copy documents. Since a blog can exist merely for personal use, sharing information with an exclusive group or to engage the public, a blog owner can set their blog for private or public access.


What is Vlog?


In the early days of blogging, vlogs were called podcasts, a term that was used to refer to both audio and video blog posts. Today the two have adopted their own distinct nomenclature.
The term Vlog is also used by video streamers who don't use a blog but post scheduled updates via other means like Youtube their profile often advertises them as Vloggers. However, live broadcasts are available too, from websites like YouTube and Facebook, and those are also considered vlogs.
Vlogging, therefore, has become a mix of blogging and streaming, with or without the other so long as there are self-made, first-person videos involved.
A vlog is sometimes also called a videocast or vodcast. Motovlogs are vlogs made while riding a motorcycle.

What is Podcast?


A podcast is an audio show, usually spread across a series of episodes, which can be downloaded from the Internet and listened to either on a computer or an Mp3 player. The term, which was coined in 2004, is portmanteau of ‘iPod’ and ‘broadcast’.

Why is the specialist channels are effective?


1- Increase search engine traffic

The more you post about your blog pages the more people will read you blog. Every blogger must have many ideas for them to write in their blog. It will make you have more reader if you write your blog more interesting and entertaining. When you increase your post, page and content it will improve your website traffic. Every page you publish , you will have the opportunities for reader to read your blog and comment it. The more you publish your blog, It will make your rank better and better because it show that the reader are entertain reading your blog.

2- Support your social media initiatives

Its really hard to maintain an active social media presence without our unique and high quality content. People around the world would not read our blog if they do not see our content or story interesting. Yes, sharing people content or blog is great but it will only increase their traffic rather than ours. You have to find  some point for directing it to our website to make that they can read our blog also. If you share your blog on Facebook, Instagram, Whatsapp and Twitter people that follow you and in your contact will know that you have a blog and it will show that  you share it because you have a better story for them and it will increase your traffic. For all blogger that received an email of newsletter , it is a sign that your blog become the top 10 list of the best blog content. It will show that the reader are appreciate for you valuable content. 

3- Improve conversion rate

when your blog are active, it will show that your business is alive and well,loved and maintain. This will show that your blog are active and have more interesting story for the reader and it will increase your conversion rate because your blog will be seen on the top list. People around the world will know that you are an active blogger and it will increase your traffic also but an non-active blogger will show that the reader not interested reading your blog and effect your business. As i said in the top, The better quality content will also build brand loyalty and increase your conversion rate. According to Hubspot, Overall ROI is also more likely to increase for companies who blog. In fact, business who prioritize blogging experience a 13X increase in ROI, year after year.

The social impacts of the use of IT :-


People around the world nowadays use more IT everyday for their daily life because its easy for them to communicate with their family, friends, lecturer and cousin. Nowadays more people spend their time with computer because computers got all the wanted such as shopping, games , and knowledge from Google. It makes our people life easier because we can buy accessories from computers and the benefits of it is shopping online are more faster. You can even sell your accessories through online website such as Facebook and Instagram. You can chat with your customers more easier and faster rather seeing each other and set time to meet. From this website , sometimes customers that text you can be your friend or it can be your old friend. You can chat your friend through Facebook even calling each other. There are many benefits using It but there are also many negative of it.

Economic Impacts :-


Communication : Nowadays It is very easy to contact everyone because we have a modern technology called mobile phone . We can use mobile phone to contact people even our boss and text with him about work and asking about more knowledge. When you are in the other county, you can even video call to your parents , staff and bosses to check that you are working or lying and having fun But the negative of it is that it is very rude to use mobile phone and texting your bosses rather than communicate face to face. It is more easier discuss in face to face rather than using phone because we do not how our bosses reaction and decision about our discussion. It will be discipline if we communicate face to face rather than using phone

Company Personal Information : Most company are using computers for their staff to use it for working on their job. It is very easy to check if our computers went wrong when the time we out of job because we put our name , address , mobile phone number , email on the computer. The staff can easily contact us to fix our computer, sometimes we put password on the computer so that no one can open it and destroy your work but the most important is about the negative impact of it. If we put too many about privacy on the computer the company can effect about it because our company are easily been hacked by the hacker to check our privacy and use it. It will be a big problem if our profile been taken and used against crime, it will make you arrested and make the company name bad and destroy your company name.

Legal Impacts :-


Films - People around the world like to watch movies, drama because it can release our stress from works and we can enjoy with friends. Everyone in the world always excited about a new movie releases and wanted their films faster. We also can download movies from computers and mobile phone. it really easy to download movies but sometimes there are a website that contain virus. The most dangerous about it if someone stole the new films and post it without any agreement it will told as crimes because we stole someone movies and post it when it is still playing on the cinema. It is okay to quoting about other people's work is fine as long as knowledge the source of the information, but telling people that your woke is yours but it is not is not allowed plagiarism is a big problem.

Quote or Knowledge - There are many quote on google that can use for your own advice for IT and others. Some of the quotes are from someone who use to do it for people. Thousand of quotes are on google same as knowledge. You can find anything about knowledge on google but some of it are not that true. Usually knowledge can be on blog because blogger like too share information about t=what they learn but some people steal the quotes and use it as their quotes. You cannot do this because once the original user of it know this he can make you pay it. you can take the quotes but you have to make references about it.

Ethical Impacts :-


Privacy - Nowadays, People around the world waste their time with playing computers using Facebook, Twitter , Instagram and Youtube. On this website we can put our privacy such as our name, pictures, phone number , address and many more. All people do that so that their friends can know that its his friends and it can be followed and also many people use Instagram to post their picture when they have a vacation and make story but there are many dangerous effect can be happen. Other people can steal your identity and make it as the same as yours and pretend to be you. Your privacy can be use for crimes such as buying things that illegal using your name. You can be arrested because of what you're doing even though its not your doing.

Unequal Access Implications :-


Business - With the modern technology, people nowadays use internet to do business, online shopping and banking. We can do business using Facebook where all people around the world can see our advertisement. Some countries such as China have their own website that only can be use by 
Chinese society. They can do business there to make it easier because China have a large country. But some of the communities cannot use it because they do not have internet such as small villagers , Poor family. It would be hard for them to buy and sell product.

Internet - All develop country have a better internet access for their people to use such as United Kingdom. You can use anywhere you want because UK have an internet in every place and its faster than any countries in the world and it is good for our education but for some countries like India and Indonesia they do not have internet access like UK. It will make a problem for student for education which can make them falling behind.

How to ensure safe and secure use of a specialist communication channel?

1- Personal Information


Personal Information is about yourself such as our names, emails, phone number , location. To ensure our specialist channel are safe you do not have to put all in details about our personal information in any website that contain about it. There are many website that make you have to tell about yourself such as Facebook, Instagram, Twitter and also Blog. It will be dangerous for you to put your personal information in details because nowadays people use nicknames to hide their true identity and there are many stalkers around the world that can steal your information and use it as you. In online, You do not have to put your personal information in details and you have hide your location because hacker can hack your account and see where you live to take the chances to steal or make anything dangerous when they know you are alone because you post a pictures that your family are away out of the county.

2- Viewing Digital Content


Viewing digital content is when you can view media and other stuff all over the internet. This is really fun to do it but sometimes there are a website that contain viruses. It can make your computers hacked and shut down the network that you use. This effect will make your company information stolen and also your personal information. It can make your company funds been used by the hacker and steal all your company funds. Not only this, there are one more problem viewing media which is Ads. In the internet, there are many Ads which can make you angry because it is too annoying. The more you click the Ads the more Ads pop up. Sometimes these Ads have viruses that can make you use your money in the internet. Too avoid this you have to ensure that your software are well protected and secure.

3- Uploading Digital Content


Uploading digital content is when you post your pictures on the website or media where everyone around the world can see it or access it. Sometimes when you post a pictures on the internet, people will comment about it , it can be a good one but sometimes it can be a bad comment which can make the other offended. The user will be angry because of that comment and said that he can post anything they want. Yes, you can post anything but the problems is that everything you post in the internet will stay forever and it can be retrieved by anyone. People can copy and if you copy the same as the others and post it. It can be a problem.

4- Respect Towards Others


Respect towards other for me are very important in our life but nowadays in the internet people started to bullying , trolling others. Some people in the internet does not respects others account in the Facebook, Instagram, Twitter and Blog. People started to bullying and make a bad comment so that the user are annoyed of us and if the user comment back , they do something or said something that can make us scared. This problems will lead as cyber bullying.This problem are very dangerous because it can make us crazy and suicide. To avoid this problem you have to check the website that can blocked people who troll you.

5-  Secure Data


Secure data are very important in the internet because secure data are mean as password, firewall and secure sites. You have to put passwords on your account so that people cannot log in to your account and steal your information. Passwords, It is the best if you put your password longer and hard to think such as Hashtag and others. You can put it on your Password so that hackers cannot hacked it because it is unacceptable. A secure site is the best site to use because it does not have Ads and Viruses and also it help your account to hide your username and password from people.

Potential threats which use of IT introduced?

There are 4 types of threats that IT introduces which is Cyber Bullying, Spam, Phishing and Denial of service.

1- Cyber Bullying


Cyber bullying is bullying other people in the internet using computers and mobile phone. Usually there are cyber bullying in Games also website that famous nowadays which is Facebook, Instagram and Twitter. Cyber Bullying includes Sending, Posting or sharing negative, harmful and false about someone else to make they annoyed and scared. This problem are includes sharing their personal information to make them humiliate and Viral. Cyber Bullying are a Crimes because it can make others suicide.

Cyber bullying is a threat because it contain a negative message and it will be post online anonymously. The post will be comments with a negative comment that can offend yourself. After its Viral you will be embarrassed because of your picture and it can make you been remove from groups and left out. They use fake id to humiliate you and pretend to be like you after they steal your information and pictures

Cyber bully can be affected by eating drugs and alcohol because people that have been embarrassed will feel afraid, ashamed after their profile viral. After this happen, you will be unwilling to attend school because you afraid you will be punish and all you friends will left you. It also can make your health problems and it will be affected in your grades because you cannot study well enough. If the user kept being bully it can make they suicide because they cant resist the stressful problems.

Cyber bully are really dangerous because it can makes us suicide because of cant resist shameful and fear that the user has taken. Suicide are a very serious problems because it is a crime and it is a sign that the bullying person are brave to do it until the user that have been bully are suicide, Usually, Facebook are the famous one of cyber bullying. This problem have an example of it :-



 Tyler Clementi, a shy 18-year-old Rutgers University (New Jersey) freshman with a passion for playing the violin, jumped to his death from the George Washington Bridge on September 22, 2010. His last words, posted onto his Facebook profile about 10 minutes before he died, were: "Jumping off the gw bridge sorry."

This occurred after a sexual encounter he had with a man in his dorm room was allegedly video streamed over the internet without Clementi's knowledge, by his fellow first-year students Dharun Ravi and Molly Wei, and after a second attempt was made by Ravi to record Clementi's sexual encounters. 

Ravi and Wei were charged with invasion of privacy.

There are many ways to solve this solutions and to avoid this threats. If someone text you or comment about you, you should never react about it and reply back with something rude because it can make you have the problems even worse. You also can block the person who comment about you or report it to the social media platform. The most best solutions is keep your social media private and never connect with someone you do not familiar.


2- Spam


Spam are usually happen when you enter a website that contain viruses. It will spam every website that you enter and sometimes that viruses can shutdown your computers and network. Spam usually are very annoying because every time you enter a website it will pop up. You should protect your email because spam contain viruses.

Spam is a threat because it will eat up a lot of network Bandwith and it just wasting people time whenever it pop up.Consequently, there are many organizations, as well as individuals, who taken it upon themselves to fight spam with a variety of techniques. But because of internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail.

Spam can affect by filling in the inbox with ridiculous email that can waste your time to read it. Usually, Develop countries have a great speed of internet but after affect by spam it will decrease your internet speed to a great extent. Spam is really dangerous because it will steals useful information like your details on your contact list.

Spam are really dangerous because it may promote you products with little real value, get rich quick schemes, quasi medical products, dicey legal products and potentially illegal offers and products. Its also hijack real user's identities to send spam to other users.



With the multitude of types of spam messages designed to deceive email users, one cannot blindly open an email and trust the content open-heartedly. We recommend that users remain watchful and refrain from clicking URLs in unsolicited or unexpected emails.

https://www.symantec.com/connect/blogs/new-spam-attack-abusing-amazon-apple-twitter-email-notification

To avoid this spam you should use updated and trustworthy antivirus program and also never share your email and personal information like credit card. The most important is to avoid responding to any email that you never asked for.


3- Phishing


phishing is a method that criminals use to trick people in give them their online banking password and security detalils. The criminals send you an email which look like it's form your bank with a link to a wed site that look's like your bank log-in screen to your online bank. however the web page is under the criminal's control and allows them to know your password and username. then use this to take money form your bank .

Regardless of whether an employee is doing their online banking or research for a work project, if they access a fake phishing website from their work computer, and download executable malware, the organization´s entire network could be infected Depending on the nature of the malware, data could compromised, stolen or encrypted into a format that makes it unusable until a ransom is paid.
The reach of phishing cannot be overstated, as it’s now a menace plaguing every level of society. We’ve talked before about common email scam and how they relate to phishing, and while email is the default communications medium for phishing, in all honesty any digital text based medium – like chat clients or text messaging  is conducive to phishing. Essentially, if you have an email address, cell phone, social media account or communicate online in any way, you are a potential target for any type of phishing.
Phishing can take your personal information and take all your bank account funds. it really dangerous if you believe the pop up viruses. there are an examples of phishing attack where you should avoid it or delete it

The user is redirected to myuniversity.edurenewal.com, a bogus page appearing exactly like the real renewal page, where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on the university network.


4- Denial Of Service


Denial of service is a security event that oocurs when an attacker takes action that prevent legitimate users from accessing targeted computer systems, devices or other network resources.

Denial of service is a threat because it attack typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them. while an attack that crashes a server can often be dealt with successfully by simply rebooting the system, flooding attacks can be more difficult to recover from.

The main aim of a DDoS attack is to slow down or disable sites and servers by flooding them with false traffic. Therefore any company that operates online services will suffer if their server is targeted and breached.
Potential and existing custom could be lost when people are unable to access a site to browse or make a purchase. But in more serious circumstances, sensitive data could also be compromised.
Denial of Service (DoS) attacks constitutes one of the major threats and among the hardest security problems in today's Internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, a DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time. 



There many ways to avoid denial of service attack but the best way to avoid is have firewall in your laptop. It can give you a sign that your laptop are been attack by denial of service.



















Comments

Popular posts from this blog

Menutup Aurat